Iraqi block cipher: Difference between revisions
Rescuing 2 sources and tagging 0 as dead. #IABot (v1.6.1) (Balon Greyjoy) |
|||
Line 11: | Line 11: | ||
==External links== |
==External links== |
||
* [http://www.mavi1.org/web_security/cryptography/ibc/ibc.c Source code for the cipher] |
* [https://web.archive.org/web/20110705145733/http://www.mavi1.org/web_security/cryptography/ibc/ibc.c Source code for the cipher] |
||
* [http://iraqiblockcipher.fortunecity.com/ File encryption with IBC in ECB and CBC Mode] |
* [https://web.archive.org/web/20110711020713/http://iraqiblockcipher.fortunecity.com/ File encryption with IBC in ECB and CBC Mode] |
||
{{Cryptography navbox | block}} |
{{Cryptography navbox | block}} |
Revision as of 21:49, 11 December 2017
anonymous FTP upload around July 1999, and widely distributed on Usenet. It is a five round unbalanced Feistel cipher operating on a 256 bit block with a 160 bit key .
A comment suggests that it is of Iraqi origin. However, like the S-1 block cipher, it is generally regarded as a hoax, although of lesser quality than S-1. Although the comment suggests that it is Iraqi in origin, all comments, variable and function names and printed strings are in English rather than Arabic; the code is fairly inefficient (including some pointless operations), and the cipher's security may be flawed (no proof). Because it has a constant key schedule the cipher is vulnerable to a slide attack. However, it may take 264 chosen texts to create a single slid pair, which would make the attack unfeasible. It also has a large number of fixed points, although that is not necessarily a problem, except possibly for hashing modes. No public attack is currently available. As with S-1, it was David Wagner who first spotted the security flaws.[1] References
External links
|